ASAP 3 HRS!! PYTHON ASSIGNMENT

8 Exercises

  1. Create a list of your favourite superheros and another list of their secret identities.
    1. Convert your two lists into a dictionary. (Can you do it in one line?)
    2. Remove one of your heroes and add a villain to your dictionary.
    3. Add a character that has multiple identities to your dictionary. (What kind of object should this be?)
    4. Demonstrate that you can look up one of your character’s identities.

SuperheroIdentityIron ManTony StarkThe ThingBen GrimmStormOroro MunroeSpider-ManPeter Parker, Miles MoralesIn [61]:

# Add your solution here
  1. Use Hubble’s law (????=????0????v=H0D) to calculate the distance (in Mpc) of the galaxies in the following table.

GalaxyVelocity (km/s)NGC 1231320NGC 23425690NGC 44428200

Remember that ????0≈70H0≈70 km/s/Mpc.

In [ ]:

# Add your solution here
  1. Flatten the following list using list comprehension.
mylist = [[[1, 2], [3, 4, 5]], [[6], [7, 8]]]

In [ ]:

# Add your solution here
  1. Write a generator function that can be used to calculate the Fibonacci sequence.

In [ ]:

# Add your solution here

LAST 4 QUESTIONS ON THE ATTACHED FILE!

cloud based anti virus

 

Need a  Cloud-based Antivirus which would satisfy the specs mentioned below

1. Must have a local agent/software on the local computer that monitors a directory for new files.

2. Whenever a new file is added to this directory, the local agent must check the file to find if it is in the blacklist or whitelist.

3. If it is in neither, then the local agent must upload it to the cloud.

4. On the cloud side, there must be the following components: multiple virtual machines each with a separate anti virus engine installed, and a central monitor virtual machine that accepts file uploads (or monitors file uploads to S3), and then uses cloud services such as AWS Lambda to provide the file to the virtual machines with anti virus engines. The engines scan the file and sends report back to the monitor which combines the reports and sends the report back to the local engine, telling it if it is a virus/not a virus. Also, the blacklist or whitelist must be updated

Evaluating and Controlling Technology

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a “citation for each answer”.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowdsourced answers?

5. What are some drawbacks to crowd-sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without GPS?

9. If models are simplifications of reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Journal

 

write your reflections on the ethical issues in computing technology that you encounter or think about.  These Journals are MANDATORY.  

Please write a short paragraph of 250 words discussing any ethical issue that you come across at school, work or in your personal experience.  Document what you are thinking and/or feeling as it relates to any ethical issues in computing or technology…any dilemmas that arise?  Try to write a little about the issue and your feeling or ideas.    If you are new to journaling, this may feel unusual.  It is OK to be a little worried about the unknown, however, let the worry go and just explore the work and thoughts as they unfold.  

H4

 Download and read the document and answer all questions in the document. Please see attached document H3 & APA Criteria doc.  

CIS 222 DB6

 1 page

Some of the security controls that were selected during Phase 2 of RMF included data encryption. There was some confusion in the working group meeting this week regarding the need for multiple encryption solutions in the implementation and assessment phases (3&4).

Consider the difference between data at rest (storage) encryption and data in transit (transmission) encryption. Describe a possible implementation solution for each of these cases and explain if it falls within the symmetric or asymmetric model. Provide an assessment of the strengths and weaknesses of the proposed solution options. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further discuss the strengths and weaknesses of the various technologies.

Need summary of all videos available here

Please go through the below links and write the summary and bullets points for each lecture. Furthermore some of the example from your own has to added in the reading assignment as well.

1. https://www.youtube.com/embed/PySo_6S4ZAg

2. https://www.youtube.com/embed/AwQHqWyHRpU

3. https://www.youtube.com/embed/JUJNGv_sb4Y

4. https://www.youtube.com/embed/ANszao6YQuM

5. https://www.youtube.com/embed/IM9ANAbufYM

6. https://www.youtube.com/embed/G5FNYxbW_Qw

7. https://www.youtube.com/embed/gCJCgQW_LKc

8. https://www.youtube.com/embed/733m6qBH-jI

9. https://www.youtube.com/embed/NP2XqpgTJyo

10. https://www.youtube.com/embed/IFLstgCNOA4